First page Back Continue Last page Summary Graphic
38. Corrupt Private Keys
- Corrupt the private key distribution packets used to encrypt sessions so that private keys are wrong.- This depends on a poor key distribution system
- It probably wont work in most current systems
- But then
 you never know...
 
Notes: